Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 21:02

General

  • Target

    origin.exe

  • Size

    552KB

  • MD5

    fd49a17b3d4bfe10a79a8f6c25f72f50

  • SHA1

    a25885590c16d80d46846d75f1f7646bfc26c005

  • SHA256

    7df4c22eb854a3167a7f606f9ad2baf1d6fff8ac85c8b4d265248e272afdbaab

  • SHA512

    3049f06b75f8ec88ffb75cdd97ac68c63f0ef4cf9d53791a6bdda0886f9021fea1b470f2b8a137ef9d4d3dac15773562878b11657f11ce041b4cfa3416d1a762

  • SSDEEP

    12288:GPqfpmguB1C6MgG4WymunsifuHqDoCu9l9jq:IqfpmguvC6zG46u+HqDoL9j

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 7 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\origin.exe
    "C:\Users\Admin\AppData\Local\Temp\origin.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\oyGqcapvIL.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:792
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\oyGqcapvIL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF2CC.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4412
    • C:\Users\Admin\AppData\Local\Temp\origin.exe
      "C:\Users\Admin\AppData\Local\Temp\origin.exe"
      2⤵
        PID:3332
      • C:\Users\Admin\AppData\Local\Temp\origin.exe
        "C:\Users\Admin\AppData\Local\Temp\origin.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4104
        • C:\Users\Admin\Documents\internetexploer.exe
          "C:\Users\Admin\Documents\internetexploer.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\oyGqcapvIL.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3160
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\oyGqcapvIL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9DC2.tmp"
            4⤵
            • Creates scheduled task(s)
            PID:4812
          • C:\Users\Admin\Documents\internetexploer.exe
            "C:\Users\Admin\Documents\internetexploer.exe"
            4⤵
            • Executes dropped EXE
            PID:1916

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      Filesize

      2KB

      MD5

      968cb9309758126772781b83adb8a28f

      SHA1

      8da30e71accf186b2ba11da1797cf67f8f78b47c

      SHA256

      92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

      SHA512

      4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      18KB

      MD5

      582a69eeda1cc94f78cdc89027e2889d

      SHA1

      e0b515e6982a23dc11eb6cb3c48a1cc4bb119c62

      SHA256

      e4f415e7e5d48c84c1fdc6924a9b21bf9300c7278b15cc6239b4519ef9e8de37

      SHA512

      889a88366fc0308c3830863b90d71816fb64e43f68a21f0ef0e33c6c0f2aa3851371352f4d2b952f0e2a9d506afcca141675a2f0653e21ceee2b4c6d1b22a632

    • C:\Users\Admin\AppData\Local\Temp\tmp9DC2.tmp
      Filesize

      1KB

      MD5

      0ec447f4eb5393815a15ba81e07ee72a

      SHA1

      d28e1247efe8fca16dc2ae29e63d47a12af1d6c7

      SHA256

      544a62aaa4aa4051523d97f2bc75b4355177ac25cfadb50aa7569bc9da096848

      SHA512

      b098072e3888f9339fae84ef07d2c205c8f72ebfd7e876aad66933ff72da2d206b83d1027d6f9d6a9ed2f947e30139c4c4fb3679bd92f259b7c56687ff63ed44

    • C:\Users\Admin\AppData\Local\Temp\tmpF2CC.tmp
      Filesize

      1KB

      MD5

      0ec447f4eb5393815a15ba81e07ee72a

      SHA1

      d28e1247efe8fca16dc2ae29e63d47a12af1d6c7

      SHA256

      544a62aaa4aa4051523d97f2bc75b4355177ac25cfadb50aa7569bc9da096848

      SHA512

      b098072e3888f9339fae84ef07d2c205c8f72ebfd7e876aad66933ff72da2d206b83d1027d6f9d6a9ed2f947e30139c4c4fb3679bd92f259b7c56687ff63ed44

    • C:\Users\Admin\Documents\internetexploer.exe
      Filesize

      552KB

      MD5

      fd49a17b3d4bfe10a79a8f6c25f72f50

      SHA1

      a25885590c16d80d46846d75f1f7646bfc26c005

      SHA256

      7df4c22eb854a3167a7f606f9ad2baf1d6fff8ac85c8b4d265248e272afdbaab

      SHA512

      3049f06b75f8ec88ffb75cdd97ac68c63f0ef4cf9d53791a6bdda0886f9021fea1b470f2b8a137ef9d4d3dac15773562878b11657f11ce041b4cfa3416d1a762

    • C:\Users\Admin\Documents\internetexploer.exe
      Filesize

      552KB

      MD5

      fd49a17b3d4bfe10a79a8f6c25f72f50

      SHA1

      a25885590c16d80d46846d75f1f7646bfc26c005

      SHA256

      7df4c22eb854a3167a7f606f9ad2baf1d6fff8ac85c8b4d265248e272afdbaab

      SHA512

      3049f06b75f8ec88ffb75cdd97ac68c63f0ef4cf9d53791a6bdda0886f9021fea1b470f2b8a137ef9d4d3dac15773562878b11657f11ce041b4cfa3416d1a762

    • C:\Users\Admin\Documents\internetexploer.exe
      Filesize

      552KB

      MD5

      fd49a17b3d4bfe10a79a8f6c25f72f50

      SHA1

      a25885590c16d80d46846d75f1f7646bfc26c005

      SHA256

      7df4c22eb854a3167a7f606f9ad2baf1d6fff8ac85c8b4d265248e272afdbaab

      SHA512

      3049f06b75f8ec88ffb75cdd97ac68c63f0ef4cf9d53791a6bdda0886f9021fea1b470f2b8a137ef9d4d3dac15773562878b11657f11ce041b4cfa3416d1a762

    • memory/740-136-0x0000000005110000-0x000000000511A000-memory.dmp
      Filesize

      40KB

    • memory/740-137-0x0000000000EB0000-0x0000000000F4C000-memory.dmp
      Filesize

      624KB

    • memory/740-135-0x00000000051C0000-0x0000000005366000-memory.dmp
      Filesize

      1.6MB

    • memory/740-134-0x0000000004F70000-0x0000000005002000-memory.dmp
      Filesize

      584KB

    • memory/740-133-0x0000000005480000-0x0000000005A24000-memory.dmp
      Filesize

      5.6MB

    • memory/740-132-0x0000000000520000-0x00000000005AA000-memory.dmp
      Filesize

      552KB

    • memory/792-143-0x00000000057A0000-0x0000000005DC8000-memory.dmp
      Filesize

      6.2MB

    • memory/792-165-0x0000000007D10000-0x0000000007D2A000-memory.dmp
      Filesize

      104KB

    • memory/792-148-0x0000000005570000-0x0000000005592000-memory.dmp
      Filesize

      136KB

    • memory/792-140-0x0000000005080000-0x00000000050B6000-memory.dmp
      Filesize

      216KB

    • memory/792-150-0x0000000005610000-0x0000000005676000-memory.dmp
      Filesize

      408KB

    • memory/792-151-0x0000000005F00000-0x0000000005F66000-memory.dmp
      Filesize

      408KB

    • memory/792-166-0x0000000007CF0000-0x0000000007CF8000-memory.dmp
      Filesize

      32KB

    • memory/792-164-0x0000000007A20000-0x0000000007A2E000-memory.dmp
      Filesize

      56KB

    • memory/792-163-0x0000000007C30000-0x0000000007CC6000-memory.dmp
      Filesize

      600KB

    • memory/792-138-0x0000000000000000-mapping.dmp
    • memory/792-156-0x0000000006090000-0x00000000060AE000-memory.dmp
      Filesize

      120KB

    • memory/792-157-0x0000000006C90000-0x0000000006CC2000-memory.dmp
      Filesize

      200KB

    • memory/792-158-0x0000000070310000-0x000000007035C000-memory.dmp
      Filesize

      304KB

    • memory/792-159-0x0000000006A60000-0x0000000006A7E000-memory.dmp
      Filesize

      120KB

    • memory/792-160-0x0000000008060000-0x00000000086DA000-memory.dmp
      Filesize

      6.5MB

    • memory/792-161-0x00000000079E0000-0x00000000079FA000-memory.dmp
      Filesize

      104KB

    • memory/792-162-0x0000000007A40000-0x0000000007A4A000-memory.dmp
      Filesize

      40KB

    • memory/1916-177-0x0000000000400000-0x0000000000568000-memory.dmp
      Filesize

      1.4MB

    • memory/1916-171-0x0000000000000000-mapping.dmp
    • memory/1916-175-0x0000000000400000-0x0000000000568000-memory.dmp
      Filesize

      1.4MB

    • memory/1916-179-0x0000000000400000-0x0000000000568000-memory.dmp
      Filesize

      1.4MB

    • memory/1944-152-0x0000000000000000-mapping.dmp
    • memory/3160-178-0x0000000070760000-0x00000000707AC000-memory.dmp
      Filesize

      304KB

    • memory/3160-167-0x0000000000000000-mapping.dmp
    • memory/3332-142-0x0000000000000000-mapping.dmp
    • memory/4104-155-0x0000000000400000-0x0000000000568000-memory.dmp
      Filesize

      1.4MB

    • memory/4104-144-0x0000000000000000-mapping.dmp
    • memory/4104-147-0x0000000000400000-0x0000000000568000-memory.dmp
      Filesize

      1.4MB

    • memory/4104-145-0x0000000000400000-0x0000000000568000-memory.dmp
      Filesize

      1.4MB

    • memory/4104-149-0x0000000000400000-0x0000000000568000-memory.dmp
      Filesize

      1.4MB

    • memory/4412-139-0x0000000000000000-mapping.dmp
    • memory/4812-168-0x0000000000000000-mapping.dmp